chef.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package chef
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "net/url"
  19. "strings"
  20. "time"
  21. "github.com/go-chef/chef"
  22. "github.com/go-logr/logr"
  23. "github.com/tidwall/gjson"
  24. corev1 "k8s.io/api/core/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  28. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  29. "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  30. "github.com/external-secrets/external-secrets/pkg/metrics"
  31. "github.com/external-secrets/external-secrets/pkg/utils"
  32. )
  33. const (
  34. errChefStore = "received invalid Chef SecretStore resource: %w"
  35. errMissingStore = "missing store"
  36. errMissingStoreSpec = "missing store spec"
  37. errMissingProvider = "missing provider"
  38. errMissingChefProvider = "missing chef provider"
  39. errMissingUserName = "missing username"
  40. errMissingServerURL = "missing serverurl"
  41. errMissingAuth = "cannot initialize Chef Client: no valid authType was specified"
  42. errMissingSecretKey = "missing Secret Key"
  43. errInvalidClusterStoreMissingPKNamespace = "invalid ClusterSecretStore: missing privateKeySecretRef.Namespace"
  44. errFetchK8sSecret = "could not fetch SecretKey Secret: %w"
  45. errInvalidURL = "invalid serverurl: %w"
  46. errChefClient = "unable to create chef client: %w"
  47. errChefProvider = "missing or invalid spec: %w"
  48. errUninitalizedChefProvider = "chef provider is not initialized"
  49. errNoDatabagItemFound = "data bag item %s not found in data bag %s"
  50. errNoDatabagItemPropertyFound = "property %s not found in data bag item"
  51. errCannotListDataBagItems = "unable to list items in data bag %s, may be given data bag doesn't exists or it is empty"
  52. errUnableToConvertToJSON = "unable to convert databagItem into JSON"
  53. errInvalidFormat = "invalid key format in data section. Expected value 'databagName/databagItemName'"
  54. errStoreValidateFailed = "unable to validate provided store. Check if username, serverUrl and privateKey are correct"
  55. errServerURLNoEndSlash = "serverurl does not end with slash(/)"
  56. errInvalidDataform = "invalid key format in dataForm section. Expected only 'databagName'"
  57. errNotImplemented = "not implemented"
  58. ProviderChef = "Chef"
  59. CallChefGetDataBagItem = "GetDataBagItem"
  60. CallChefListDataBagItems = "ListDataBagItems"
  61. CallChefGetUser = "GetUser"
  62. )
  63. var contextTimeout = time.Second * 25
  64. type DatabagFetcher interface {
  65. GetItem(databagName string, databagItem string) (item chef.DataBagItem, err error)
  66. ListItems(name string) (data *chef.DataBagListResult, err error)
  67. }
  68. type UserInterface interface {
  69. Get(name string) (user chef.User, err error)
  70. }
  71. type Providerchef struct {
  72. clientName string
  73. databagService DatabagFetcher
  74. userService UserInterface
  75. log logr.Logger
  76. }
  77. var _ v1beta1.SecretsClient = &Providerchef{}
  78. var _ v1beta1.Provider = &Providerchef{}
  79. func init() {
  80. v1beta1.Register(&Providerchef{}, &v1beta1.SecretStoreProvider{
  81. Chef: &v1beta1.ChefProvider{},
  82. })
  83. }
  84. func (providerchef *Providerchef) NewClient(ctx context.Context, store v1beta1.GenericStore, kube kclient.Client, namespace string) (v1beta1.SecretsClient, error) {
  85. chefProvider, err := getChefProvider(store)
  86. if err != nil {
  87. return nil, fmt.Errorf(errChefProvider, err)
  88. }
  89. credentialsSecret := &corev1.Secret{}
  90. objectKey := types.NamespacedName{
  91. Name: chefProvider.Auth.SecretRef.SecretKey.Name,
  92. Namespace: namespace,
  93. }
  94. if store.GetObjectKind().GroupVersionKind().Kind == v1beta1.ClusterSecretStoreKind {
  95. if chefProvider.Auth.SecretRef.SecretKey.Namespace == nil {
  96. return nil, errors.New(errInvalidClusterStoreMissingPKNamespace)
  97. }
  98. objectKey.Namespace = *chefProvider.Auth.SecretRef.SecretKey.Namespace
  99. }
  100. if err := kube.Get(ctx, objectKey, credentialsSecret); err != nil {
  101. return nil, fmt.Errorf(errFetchK8sSecret, err)
  102. }
  103. secretKey := credentialsSecret.Data[chefProvider.Auth.SecretRef.SecretKey.Key]
  104. if len(secretKey) == 0 {
  105. return nil, errors.New(errMissingSecretKey)
  106. }
  107. client, err := chef.NewClient(&chef.Config{
  108. Name: chefProvider.UserName,
  109. Key: string(secretKey),
  110. BaseURL: chefProvider.ServerURL,
  111. })
  112. if err != nil {
  113. return nil, fmt.Errorf(errChefClient, err)
  114. }
  115. providerchef.clientName = chefProvider.UserName
  116. providerchef.databagService = client.DataBags
  117. providerchef.userService = client.Users
  118. providerchef.log = ctrl.Log.WithName("provider").WithName("chef").WithName("secretsmanager")
  119. return providerchef, nil
  120. }
  121. // Close closes the client connection.
  122. func (providerchef *Providerchef) Close(_ context.Context) error {
  123. return nil
  124. }
  125. // Validate checks if the client is configured correctly
  126. // to be able to retrieve secrets from the provider.
  127. func (providerchef *Providerchef) Validate() (v1beta1.ValidationResult, error) {
  128. _, err := providerchef.userService.Get(providerchef.clientName)
  129. metrics.ObserveAPICall(ProviderChef, CallChefGetUser, err)
  130. if err != nil {
  131. return v1beta1.ValidationResultError, errors.New(errStoreValidateFailed)
  132. }
  133. return v1beta1.ValidationResultReady, nil
  134. }
  135. // GetAllSecrets Retrieves a map[string][]byte with the Databag names as key and the Databag's Items as secrets.
  136. func (providerchef *Providerchef) GetAllSecrets(_ context.Context, _ v1beta1.ExternalSecretFind) (map[string][]byte, error) {
  137. return nil, errors.New("dataFrom.find not suppported")
  138. }
  139. // GetSecret returns a databagItem present in the databag. format example: databagName/databagItemName.
  140. func (providerchef *Providerchef) GetSecret(ctx context.Context, ref v1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  141. if utils.IsNil(providerchef.databagService) {
  142. return nil, errors.New(errUninitalizedChefProvider)
  143. }
  144. key := ref.Key
  145. databagName := ""
  146. databagItem := ""
  147. nameSplitted := strings.Split(key, "/")
  148. if len(nameSplitted) > 1 {
  149. databagName = nameSplitted[0]
  150. databagItem = nameSplitted[1]
  151. }
  152. providerchef.log.Info("fetching secret value", "databag Name:", databagName, "databag Item:", databagItem)
  153. if databagName != "" && databagItem != "" {
  154. return getSingleDatabagItemWithContext(ctx, providerchef, databagName, databagItem, ref.Property)
  155. }
  156. return nil, errors.New(errInvalidFormat)
  157. }
  158. func getSingleDatabagItemWithContext(ctx context.Context, providerchef *Providerchef, dataBagName, databagItemName, propertyName string) ([]byte, error) {
  159. ctxWithTimeout, cancel := context.WithTimeout(ctx, contextTimeout)
  160. defer cancel()
  161. type result = struct {
  162. values []byte
  163. err error
  164. }
  165. getWithTimeout := func() chan result {
  166. resultChan := make(chan result, 1)
  167. go func() {
  168. defer close(resultChan)
  169. ditem, err := providerchef.databagService.GetItem(dataBagName, databagItemName)
  170. metrics.ObserveAPICall(ProviderChef, CallChefGetDataBagItem, err)
  171. if err != nil {
  172. resultChan <- result{err: fmt.Errorf(errNoDatabagItemFound, databagItemName, dataBagName)}
  173. return
  174. }
  175. jsonByte, err := json.Marshal(ditem)
  176. if err != nil {
  177. resultChan <- result{err: errors.New(errUnableToConvertToJSON)}
  178. return
  179. }
  180. if propertyName != "" {
  181. propertyValue, err := getPropertyFromDatabagItem(jsonByte, propertyName)
  182. if err != nil {
  183. resultChan <- result{err: err}
  184. return
  185. }
  186. resultChan <- result{values: propertyValue}
  187. } else {
  188. resultChan <- result{values: jsonByte}
  189. }
  190. }()
  191. return resultChan
  192. }
  193. select {
  194. case <-ctxWithTimeout.Done():
  195. return nil, ctxWithTimeout.Err()
  196. case r := <-getWithTimeout():
  197. if r.err != nil {
  198. return nil, r.err
  199. }
  200. return r.values, nil
  201. }
  202. }
  203. /*
  204. A path is a series of keys separated by a dot.
  205. A key may contain special wildcard characters '*' and '?'.
  206. To access an array value use the index as the key.
  207. To get the number of elements in an array or to access a child path, use the '#' character.
  208. The dot and wildcard characters can be escaped with '\'.
  209. refer https://github.com/tidwall/gjson#:~:text=JSON%20byte%20slices.-,Path%20Syntax,-Below%20is%20a
  210. */
  211. func getPropertyFromDatabagItem(jsonByte []byte, propertyName string) ([]byte, error) {
  212. result := gjson.GetBytes(jsonByte, propertyName)
  213. if !result.Exists() {
  214. return nil, fmt.Errorf(errNoDatabagItemPropertyFound, propertyName)
  215. }
  216. return []byte(result.Str), nil
  217. }
  218. // GetSecretMap returns multiple k/v pairs from the provider, for dataFrom.extract.key
  219. // dataFrom.extract.key only accepts dataBagName, example : dataFrom.extract.key: myDatabag
  220. // databagItemName or Property not expected in key.
  221. func (providerchef *Providerchef) GetSecretMap(ctx context.Context, ref v1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  222. if utils.IsNil(providerchef.databagService) {
  223. return nil, errors.New(errUninitalizedChefProvider)
  224. }
  225. databagName := ref.Key
  226. if strings.Contains(databagName, "/") {
  227. return nil, errors.New(errInvalidDataform)
  228. }
  229. getAllSecrets := make(map[string][]byte)
  230. providerchef.log.Info("fetching all items from", "databag:", databagName)
  231. dataItems, err := providerchef.databagService.ListItems(databagName)
  232. metrics.ObserveAPICall(ProviderChef, CallChefListDataBagItems, err)
  233. if err != nil {
  234. return nil, fmt.Errorf(errCannotListDataBagItems, databagName)
  235. }
  236. for dataItem := range *dataItems {
  237. dItem, err := getSingleDatabagItemWithContext(ctx, providerchef, databagName, dataItem, "")
  238. if err != nil {
  239. return nil, fmt.Errorf(errNoDatabagItemFound, dataItem, databagName)
  240. }
  241. getAllSecrets[dataItem] = dItem
  242. }
  243. return getAllSecrets, nil
  244. }
  245. // ValidateStore checks if the provided store is valid.
  246. func (providerchef *Providerchef) ValidateStore(store v1beta1.GenericStore) (admission.Warnings, error) {
  247. chefProvider, err := getChefProvider(store)
  248. if err != nil {
  249. return nil, fmt.Errorf(errChefStore, err)
  250. }
  251. // check namespace compared to kind
  252. if err := utils.ValidateSecretSelector(store, chefProvider.Auth.SecretRef.SecretKey); err != nil {
  253. return nil, fmt.Errorf(errChefStore, err)
  254. }
  255. return nil, nil
  256. }
  257. // getChefProvider validates the incoming store and return the chef provider.
  258. func getChefProvider(store v1beta1.GenericStore) (*v1beta1.ChefProvider, error) {
  259. if store == nil {
  260. return nil, errors.New(errMissingStore)
  261. }
  262. storeSpec := store.GetSpec()
  263. if storeSpec == nil {
  264. return nil, errors.New(errMissingStoreSpec)
  265. }
  266. provider := storeSpec.Provider
  267. if provider == nil {
  268. return nil, errors.New(errMissingProvider)
  269. }
  270. chefProvider := storeSpec.Provider.Chef
  271. if chefProvider == nil {
  272. return nil, errors.New(errMissingChefProvider)
  273. }
  274. if chefProvider.UserName == "" {
  275. return chefProvider, errors.New(errMissingUserName)
  276. }
  277. if chefProvider.ServerURL == "" {
  278. return chefProvider, errors.New(errMissingServerURL)
  279. }
  280. if !strings.HasSuffix(chefProvider.ServerURL, "/") {
  281. return chefProvider, errors.New(errServerURLNoEndSlash)
  282. }
  283. // check valid URL
  284. if _, err := url.ParseRequestURI(chefProvider.ServerURL); err != nil {
  285. return chefProvider, fmt.Errorf(errInvalidURL, err)
  286. }
  287. if chefProvider.Auth == nil {
  288. return chefProvider, errors.New(errMissingAuth)
  289. }
  290. if chefProvider.Auth.SecretRef.SecretKey.Key == "" {
  291. return chefProvider, errors.New(errMissingSecretKey)
  292. }
  293. return chefProvider, nil
  294. }
  295. // Not Implemented DeleteSecret.
  296. func (providerchef *Providerchef) DeleteSecret(_ context.Context, _ v1beta1.PushSecretRemoteRef) error {
  297. return errors.New(errNotImplemented)
  298. }
  299. // Not Implemented PushSecret.
  300. func (providerchef *Providerchef) PushSecret(_ context.Context, _ *corev1.Secret, _ v1beta1.PushSecretData) error {
  301. return errors.New(errNotImplemented)
  302. }
  303. func (providerchef *Providerchef) SecretExists(_ context.Context, _ v1beta1.PushSecretRemoteRef) (bool, error) {
  304. return false, errors.New(errNotImplemented)
  305. }
  306. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  307. func (providerchef *Providerchef) Capabilities() v1beta1.SecretStoreCapabilities {
  308. return v1beta1.SecretStoreReadOnly
  309. }